Enviar pesquisa
Carregar
Hacker Culture and Free Software
•
Transferir como PPTX, PDF
•
0 gostou
•
612 visualizações
Ken-Lauren Daganio
Seguir
Seminar for the University of Sto. Tomas. 12 November, 2012.
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 65
Baixar agora
Recomendados
Ruby on Rails Introduction | FEU-EAC, February 2014
Ruby on Rails Introduction | FEU-EAC, February 2014
Ken-Lauren Daganio
Beerspots Final Pitch
Beerspots Final Pitch
Ken-Lauren Daganio
Hack
Hack
Haggen So
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
Making your hackathon matter api con-uk
Making your hackathon matter api con-uk
Cristiano Betta
Hacking and Civic Hacking
Hacking and Civic Hacking
Diego Donaggio
What The Heck Is Hacking?
What The Heck Is Hacking?
Lars Zimmermann
What the Heck are Hackathons?
What the Heck are Hackathons?
Infinite Playground / The Hackitarians
Recomendados
Ruby on Rails Introduction | FEU-EAC, February 2014
Ruby on Rails Introduction | FEU-EAC, February 2014
Ken-Lauren Daganio
Beerspots Final Pitch
Beerspots Final Pitch
Ken-Lauren Daganio
Hack
Hack
Haggen So
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
Making your hackathon matter api con-uk
Making your hackathon matter api con-uk
Cristiano Betta
Hacking and Civic Hacking
Hacking and Civic Hacking
Diego Donaggio
What The Heck Is Hacking?
What The Heck Is Hacking?
Lars Zimmermann
What the Heck are Hackathons?
What the Heck are Hackathons?
Infinite Playground / The Hackitarians
Med122 hackers lecture
Med122 hackers lecture
Rob Jewitt
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
What is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
The Hacker Perspective
The Hacker Perspective
jjtay
Ethical hacking
Ethical hacking
A Raheem Ansari
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Marc Dusseiller Dusjagr
Hacking
Hacking
Himanshu Rathoria
Makers, Hackers and Gamers
Makers, Hackers and Gamers
center4edupunx
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
hackers
hackers
Aya Eltayed
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
Hacking ppt
Hacking ppt
giridhar_sadasivuni
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
GTKlondike
Computer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Hacking
Hacking
mubeenm50
Ethical hacking
Ethical hacking
Sourabh Goyal
the best hacking ppt
the best hacking ppt
fuckubitches
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Mais conteúdo relacionado
Semelhante a Hacker Culture and Free Software
Med122 hackers lecture
Med122 hackers lecture
Rob Jewitt
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
What is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
The Hacker Perspective
The Hacker Perspective
jjtay
Ethical hacking
Ethical hacking
A Raheem Ansari
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Marc Dusseiller Dusjagr
Hacking
Hacking
Himanshu Rathoria
Makers, Hackers and Gamers
Makers, Hackers and Gamers
center4edupunx
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
hackers
hackers
Aya Eltayed
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
Hacking ppt
Hacking ppt
giridhar_sadasivuni
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
GTKlondike
Computer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Hacking
Hacking
mubeenm50
Ethical hacking
Ethical hacking
Sourabh Goyal
the best hacking ppt
the best hacking ppt
fuckubitches
Semelhante a Hacker Culture and Free Software
(20)
Med122 hackers lecture
Med122 hackers lecture
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
What is Ethical hacking
What is Ethical hacking
The Hacker Perspective
The Hacker Perspective
Ethical hacking
Ethical hacking
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Hacking
Hacking
Makers, Hackers and Gamers
Makers, Hackers and Gamers
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
hackers
hackers
Is hacking good or bad
Is hacking good or bad
Hacking ppt
Hacking ppt
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
Computer and Internet hacking
Computer and Internet hacking
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Hacking
Hacking
Ethical hacking
Ethical hacking
the best hacking ppt
the best hacking ppt
Último
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Último
(20)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Hacker Culture and Free Software
1.
Hacker Culture
+ Free Software
2.
3.
4.
HACKER
5.
CRACKER
6.
HACKER?
7.
8.
9.
10.
11.
12.
http://hacks.mit.edu
13.
playfulness, cleverness, and
exploration
14.
Hacking means exploring
the limits of what is possible, in a spirit of playful cleverness. - Richard Stallman, 2002
15.
HACKER
!= CRACKER
16.
<begin>
17.
History.
18.
19.
Why?
20.
21.
The True Hackers
22.
Tech Model Railroad
Club
23.
TMRC
24.
25.
Computer?
26.
27.
28.
29.
30.
31.
The Hacker
Ethic
32.
Access to computers—and
anything that might teach you something about the way the world works— should be unlimited and total. Always yield to the Hands-On Imperative!
33.
All information should
be free.
34.
Mistrust Authority—Promote
Decentralization.
35.
Hackers should be
judged by their hacking, not bogus criteria such as degrees, age, race, or position.
36.
You can create
art and beauty on a computer.
37.
Computers can change
your life for the better.
38.
39.
AI, Lisp, and
PROLOG.
40.
Hardware Hackers
41.
42.
Part Deux.
43.
MIT AI Lab
44.
A printer
story
45.
46.
47.
GNU
48.
GNU’s Not Unix
49.
50.
51.
52.
53.
54.
55.
56.
57.
Now?
58.
59.
60.
61.
62.
63.
Questions?
64.
KTHXBYE.
65.
superken kdaganio kendaganio kd@badsectorlabs.com ken@webgeek.ph ken@freelancer.com
Notas do Editor
I'm KenI'm the Evangelist at WebGeekI spread the good news about “WebGeek and of course Tech Scene in the Philippines!
Baixar agora